Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...
Content on the Internet is always changing. We explore the value of biasing search result snippets towards new webpage content. We present results from a user study comparing trad...
Krysta Marie Svore, Jaime Teevan, Susan T. Dumais,...
—The ability of a web service to provide low-latency access to its contents is constrained by available network bandwidth. It is important for the service to manage available ban...
Eye tracking experiments have shown that titles of Web search results play a crucial role in guiding a user’s search process. We present a machine-learned algorithm that trains ...
Tapas Kanungo, Nadia Ghamrawi, Ki Yuen Kim, Lawren...